General
-
Target
2024-09-21_3d142e9d5a6433822df80d30a7a57357_mafia
-
Size
11.2MB
-
Sample
240921-a9kv3axeqm
-
MD5
3d142e9d5a6433822df80d30a7a57357
-
SHA1
b6934545343f53c081d191a903db1f4809f03ade
-
SHA256
bb320fd8ce9b6b27201b8065281e0ad329e88519675ea7b7601cc64c5ce1c169
-
SHA512
9e58263c33e372760fd542e75c0bbddd7c1c5463dd03f820e8a3708946cf033d2a359faff69b13d106a5a7959cd376af8ce7ae6b5e76b0d46c99ec3f55d46461
-
SSDEEP
12288:AVbj7zJB99tzBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBZ:AJzXd
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-21_3d142e9d5a6433822df80d30a7a57357_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-21_3d142e9d5a6433822df80d30a7a57357_mafia.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Targets
-
-
Target
2024-09-21_3d142e9d5a6433822df80d30a7a57357_mafia
-
Size
11.2MB
-
MD5
3d142e9d5a6433822df80d30a7a57357
-
SHA1
b6934545343f53c081d191a903db1f4809f03ade
-
SHA256
bb320fd8ce9b6b27201b8065281e0ad329e88519675ea7b7601cc64c5ce1c169
-
SHA512
9e58263c33e372760fd542e75c0bbddd7c1c5463dd03f820e8a3708946cf033d2a359faff69b13d106a5a7959cd376af8ce7ae6b5e76b0d46c99ec3f55d46461
-
SSDEEP
12288:AVbj7zJB99tzBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBZ:AJzXd
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2